Poster

Results: 19881



#Item
21A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf  Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
22Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
23Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
24Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2  Institute of Information Engineering, Chinese Academy of Sciences

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
25Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
26Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 06:14:58
27Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias  Bryan Ford

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias Bryan Ford

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 19:45:56
28Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu  Ab

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
29Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
30Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2  Abstract— We are building the first comprehensive database

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34